派博傳思國際中心

標題: Titlebook: Applications and Techniques in Information Security; 13th International C Srikanth Prabhu,Shiva Raj Pokhrel,Gang Li Conference proceedings [打印本頁]

作者: Iodine    時間: 2025-3-21 16:24
書目名稱Applications and Techniques in Information Security影響因子(影響力)




書目名稱Applications and Techniques in Information Security影響因子(影響力)學科排名




書目名稱Applications and Techniques in Information Security網(wǎng)絡公開度




書目名稱Applications and Techniques in Information Security網(wǎng)絡公開度學科排名




書目名稱Applications and Techniques in Information Security被引頻次




書目名稱Applications and Techniques in Information Security被引頻次學科排名




書目名稱Applications and Techniques in Information Security年度引用




書目名稱Applications and Techniques in Information Security年度引用學科排名




書目名稱Applications and Techniques in Information Security讀者反饋




書目名稱Applications and Techniques in Information Security讀者反饋學科排名





作者: Comedienne    時間: 2025-3-21 20:42

作者: Ballerina    時間: 2025-3-22 01:51
https://doi.org/10.1007/978-3-540-75544-9 where an attacker can tamper the message for polynomial number of times. In this work, we propose a construction of continuously non-malleable code from authenticated encryption in 2-split-state model. Our construction provides security against polynomial number of tampering attacks and non-malleab
作者: 完全    時間: 2025-3-22 05:33
Emissive Materials - Nanomaterialsith its unique design. In order to increase the profitability of crypto-jacking, attackers are expanding their reach to browsers, network devices, and even Internet of Things (IoT) devices. Browsers, for example, are a particularly enticing target for attackers looking to obtain sensitive data from
作者: 細胞膜    時間: 2025-3-22 09:26
https://doi.org/10.1007/978-94-010-2044-2 for predicting distinct faces using the Decision Tree classifier model. The ensemble learning model also had an accuracy of 85%, which could potentially be improved by using more photos for comparison. In future work, the method could be applied to 3D images, which is currently an open challenge in
作者: 有偏見    時間: 2025-3-22 14:45

作者: savage    時間: 2025-3-22 19:59

作者: CRACY    時間: 2025-3-23 01:04

作者: DEVIL    時間: 2025-3-23 01:29

作者: 淡紫色花    時間: 2025-3-23 09:05
https://doi.org/10.1007/978-3-662-44150-3lanning and implementation. Organizations are spending large amounts of funding to become more integrated and secure but need more time or money to update software..This paper demonstrates the deployment of data layers on Medical Data. Patient records are kept in a remote server and are accessed onl
作者: 怕失去錢    時間: 2025-3-23 13:16

作者: 細頸瓶    時間: 2025-3-23 14:53

作者: 上釉彩    時間: 2025-3-23 21:47
Continuously Non-malleable Codes from?Authenticated Encryptions in?2-Split-State Model where an attacker can tamper the message for polynomial number of times. In this work, we propose a construction of continuously non-malleable code from authenticated encryption in 2-split-state model. Our construction provides security against polynomial number of tampering attacks and non-malleab
作者: addition    時間: 2025-3-23 22:42
Variants of Crypto-Jacking Attacks and Their Detection Techniquesith its unique design. In order to increase the profitability of crypto-jacking, attackers are expanding their reach to browsers, network devices, and even Internet of Things (IoT) devices. Browsers, for example, are a particularly enticing target for attackers looking to obtain sensitive data from
作者: 勉強    時間: 2025-3-24 03:07

作者: 冒號    時間: 2025-3-24 09:09
Analysis of?Classification Algorithms for?Predicting Parkinson’s Disease and?Applications in?the?Fieient Boosting, XGBoost, Random Forest, and Extra Trees Classification are used to estimate whether the individual is normal or affected by Parkinson’s disease. According to this study, the ensemble method Gradient Boosting classification algorithm outperformed other classification algorithms in term
作者: needle    時間: 2025-3-24 14:37
Optimization of?Secured Cluster Based Charging Dynamics and?Scheduling of?EV Using Deep RNN, at CS, vehicle time scheduling is done using the DRNN approach, considering delay-based distance computation. When compared to the stochastic Particle Swarm Optimization (PSO) algorithm for routing, the proposed DRNN-SSD routing algorithm optimizes delay and traffic congestion significantly achiev
作者: Psa617    時間: 2025-3-24 18:31

作者: BROW    時間: 2025-3-24 19:12
Detection of Android Ransomware Using Machine Learning Approachictim’s data and demands for a ransom amount for the decryption key. The present Android ransomware research is deficient in key components and relies on supervised machine-learning techniques. However, these techniques have several drawbacks and early detection and recognition of ransomware in andr
作者: collagenase    時間: 2025-3-25 00:43

作者: cartilage    時間: 2025-3-25 06:34
Applications and Techniques in Information Security13th International C
作者: 易發(fā)怒    時間: 2025-3-25 09:47
Jane Austen: Life and Background,ncryption time by 50% as compared with Blowfish algorithm. The value calculated for avalanche of the Modified Blowfish is 48.5% and the Blowfish achieved 47.14%. Matlab is used in the research work for performing encryption of the data.
作者: NICHE    時間: 2025-3-25 12:08
Modified Blowfish Encryption Algorithm for?Wireless Body Area Networkncryption time by 50% as compared with Blowfish algorithm. The value calculated for avalanche of the Modified Blowfish is 48.5% and the Blowfish achieved 47.14%. Matlab is used in the research work for performing encryption of the data.
作者: 食物    時間: 2025-3-25 18:14

作者: 凹槽    時間: 2025-3-25 23:34
Andrew C. Grimsdale,Klaus Müllend. Naive Bayes Classifier was used as a Machine Learning algorithm, TextBlob is used as the Lexicon-based approach, and the deep-learning algorithm used is BiLSTM. It was observed that BiLSTM model outperforms the other two models with an F1-score of 0.895, accuracy of 0.896, precision of 0.899, and recall of 0.891.
作者: 熱烈的歡迎    時間: 2025-3-26 02:24

作者: MUTED    時間: 2025-3-26 05:11

作者: 充滿裝飾    時間: 2025-3-26 11:28
EyeEncrypt: A Cyber-Secured Framework for?Retinal Image Segmentationges have several applications in the field of medicine, which include the early detection of various diseases such as glaucoma. Characteristics intrinsic to retinal images make the vessel detection process difficult. Our proposed framework EyeEncrypt, aids in effective medical image segmentation on a secure integrated framework.
作者: GIBE    時間: 2025-3-26 15:19
1865-0929 , ATIS 2022, held in Manipal, India, December 30–31, 2022..The 23 full papers included in this book were carefully reviewed and selected from 121 submissions. They were organized in topical sections as follows: Privacy and Security, Advances in Machine Learning, Cloud, IoT and Computing Technologies
作者: 細胞膜    時間: 2025-3-26 18:49

作者: acheon    時間: 2025-3-26 23:25
Husserl and the Problem of Ontology,sed recommendation, considering interest of a group of people is proposed here. The system also ensures privacy of the users by generating hash code of the interest provided by the group. The proposed scheme performs well with a prediction accuracy of 83% for a maximum of four users with TMDB database.
作者: Delude    時間: 2025-3-27 05:06

作者: Arable    時間: 2025-3-27 05:52

作者: Popcorn    時間: 2025-3-27 10:08

作者: 拾落穗    時間: 2025-3-27 14:29
https://doi.org/10.1007/978-3-642-58682-8ional diffusion layer. In this work, we propose two different MixColumns like matrices to the AES block cipher that secures the cipher against Differential Fault Analysis attacks. The attack complexity is increased to . with our proposed matrix.
作者: 可轉變    時間: 2025-3-27 19:11
The G?ttingen Period (1915–1933) cyber attacks by analysing the data logs and compared with the non-federated learning techniques on the same data. It is very evident from the experiment that Federated Learning is very effective in detecting these attacks by preserving the privacy of the victim organisations/systems.
作者: 喚醒    時間: 2025-3-28 00:04
A Better MixColumns Matrix to?AES Against Differential Fault Analysis Attackional diffusion layer. In this work, we propose two different MixColumns like matrices to the AES block cipher that secures the cipher against Differential Fault Analysis attacks. The attack complexity is increased to . with our proposed matrix.
作者: Common-Migraine    時間: 2025-3-28 02:34
Intrusion Detection Using Federated Learning cyber attacks by analysing the data logs and compared with the non-federated learning techniques on the same data. It is very evident from the experiment that Federated Learning is very effective in detecting these attacks by preserving the privacy of the victim organisations/systems.
作者: 期滿    時間: 2025-3-28 09:49
https://doi.org/10.1007/978-3-540-75544-9tributes will prompt privacy leakage. Choosing private data from a list of attributes is decided by the publisher, and it undoubtedly changes from dataset to dataset. The need for dynamically choosing and informing systems about a quasi and a non-quasi attribute remains a challenging task. Presently
作者: BLINK    時間: 2025-3-28 11:49
https://doi.org/10.1007/978-3-540-75544-9of tampering attack is to recover the key by altering some regions of the memory. Such attack may also appear when the device is stolen or viruses has been introduced. Non-malleable codes are used to protect the secret information from tampering attacks. The secret key can be encoded using non-malle
作者: Condescending    時間: 2025-3-28 15:24

作者: ingrate    時間: 2025-3-28 20:23

作者: 做事過頭    時間: 2025-3-29 02:00

作者: chisel    時間: 2025-3-29 05:08
Emissive Materials - NanomaterialsSince 2017 it has been widely used and was previously the most serious threat to network security. Because of the number of malicious actors has increased there is a recent increase in the value of cryptocurrencies. The availability of bit-coin mining software has grown significantly. Mining for cry
作者: parallelism    時間: 2025-3-29 08:33

作者: 重疊    時間: 2025-3-29 13:46
Jane Austen: Life and Background, are used to monitor and measure vital parameters, process them, transfer them to the wearable device controller. If an attacker tries to alter the information, the confidentiality of the data is lost and also it could prove fatal to the person to whom the data belongs to. The paper focuses on achie
作者: 錯    時間: 2025-3-29 17:32

作者: Intellectual    時間: 2025-3-29 23:20
Husserl and the Problem of Ontology, for a family with people involving different age groups and different interests. Therefore a content based filtering scheme with cosine similarity based recommendation, considering interest of a group of people is proposed here. The system also ensures privacy of the users by generating hash code o
作者: 紋章    時間: 2025-3-30 03:37
https://doi.org/10.1007/978-94-010-2044-2poses face recognition and verification of two-dimensional(2D) images by a feature extraction algorithm which involves identifying anthropological facial feature points and calculating the Euclidean Distance (ED) between these points (ED-FFP) as these distances, if required can be used as an objecti
作者: 顛簸地移動    時間: 2025-3-30 04:07
The G?ttingen Period (1915–1933)nges in the structural level also open new dimensions that are susceptible to cyber-attacks. One of the efficient methods to tackle these situations is to apply intelligence to the systems and detect abnormal behaviours. As privacy plays a vital role, here Federated Learning method is used to detect
作者: CURL    時間: 2025-3-30 12:01

作者: Feature    時間: 2025-3-30 15:18

作者: 煩躁的女人    時間: 2025-3-30 20:30
Memories and Legacies of Emmy Noether,ity Index(WQI) for river water is calculated to check the water quality. The Central Pollution Control Board (CPCB), an Indian organization, built several monitoring stations to keep an eye on the values of the physicochemical parameters under consideration. The Ganga river’s water quality index wil
作者: 大吃大喝    時間: 2025-3-30 22:54

作者: Keratectomy    時間: 2025-3-31 04:02

作者: 笨拙的我    時間: 2025-3-31 05:47

作者: Thyroxine    時間: 2025-3-31 10:17
978-981-99-2263-5The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapor
作者: Dislocation    時間: 2025-3-31 14:05

作者: Adornment    時間: 2025-3-31 18:00

作者: 喚醒    時間: 2025-4-1 00:01
Communications in Computer and Information Sciencehttp://image.papertrans.cn/a/image/159232.jpg
作者: GLEAN    時間: 2025-4-1 04:27
Reinforcement Technique for?Classifying Quasi and?Non-quasi Attributes for?Privacy Preservation and?tributes will prompt privacy leakage. Choosing private data from a list of attributes is decided by the publisher, and it undoubtedly changes from dataset to dataset. The need for dynamically choosing and informing systems about a quasi and a non-quasi attribute remains a challenging task. Presently




歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
平谷区| 台前县| 乐亭县| 辽阳县| 锦州市| 九龙县| 天津市| 汪清县| 康保县| 丰县| 株洲市| 平和县| 福州市| 岗巴县| 邵阳县| 浮山县| 星座| 司法| 会东县| 巢湖市| 太白县| 龙海市| 达州市| 通山县| 安多县| 东宁县| 都昌县| 湘乡市| 河池市| 融水| 清水县| 伊金霍洛旗| 大港区| 克什克腾旗| 武山县| 辽阳市| 曲周县| 轮台县| 冀州市| 抚顺县| 图们市|